Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 11:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
58d960f21a4783df7593bc221fbf27d8.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
58d960f21a4783df7593bc221fbf27d8.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
58d960f21a4783df7593bc221fbf27d8.exe
-
Size
385KB
-
MD5
58d960f21a4783df7593bc221fbf27d8
-
SHA1
2889fdf260dc46b7a7f521433e090361550209a3
-
SHA256
560e23e8af5a6ba0b07b2798946197ad103182a236316a3b83f6e7ca8a31de89
-
SHA512
6f7d3f4bf6cc4b0dae647cf5af054183f6914ab2b7c9e0e99b229d61fb424675a464df71ca376a913d17bc2b6ff3e9c088235c8fbfd7f4b64e942ac09b3152b0
-
SSDEEP
6144:gwSRvuyYKA5KqJpPjoGri6bUpi8fULRtNNLShAd4esl9sRyt4gRdVfcB:gwiAKBqfpri6beDENNLl47l9sRc3UB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3620 58d960f21a4783df7593bc221fbf27d8.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 58d960f21a4783df7593bc221fbf27d8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4352 58d960f21a4783df7593bc221fbf27d8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4352 58d960f21a4783df7593bc221fbf27d8.exe 3620 58d960f21a4783df7593bc221fbf27d8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4352 wrote to memory of 3620 4352 58d960f21a4783df7593bc221fbf27d8.exe 15 PID 4352 wrote to memory of 3620 4352 58d960f21a4783df7593bc221fbf27d8.exe 15 PID 4352 wrote to memory of 3620 4352 58d960f21a4783df7593bc221fbf27d8.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d960f21a4783df7593bc221fbf27d8.exe"C:\Users\Admin\AppData\Local\Temp\58d960f21a4783df7593bc221fbf27d8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\58d960f21a4783df7593bc221fbf27d8.exeC:\Users\Admin\AppData\Local\Temp\58d960f21a4783df7593bc221fbf27d8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3620
-